Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 275 | 2014 |
Neural machine translation inspired binary code similarity comparison beyond function pairs F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019 | 260 | 2019 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017 | 132 | 2017 |
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis K Redmond, L Luo, Q Zeng The NDSS Workshop on Binary Analysis Research (BAR), 2019 | 70 | 2019 |
Touch well before use: Intuitive and secure authentication for iot devices X Li, F Yan, F Zuo, Q Zeng, L Luo The 25th annual international conference on mobile computing and networking …, 2019 | 62 | 2019 |
T2pair: Secure and usable pairing for heterogeneous iot devices X Li, Q Zeng, L Luo, T Luo Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020 | 55 | 2020 |
Repackage-proofing Android Apps L Luo, Y Fu, D Wu, S Zhu, P Liu Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016 | 49 | 2016 |
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 46* | 2017 |
A multiversion programming inspired approach to detecting audio adversarial examples Q Zeng, J Su, C Fu, G Kayas, L Luo Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019 | 44 | 2019 |
Resilient decentralized android application repackaging detection using logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li Proceedings of the 2018 international symposium on code generation and …, 2018 | 42 | 2018 |
Integrating BIMserver and OpenStudio for energy efficient building N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen Computing in Civil Engineering (2013), 516-523, 2013 | 34 | 2013 |
Pfirewall: Semantics-aware customizable data flow control for home automation systems H Chi, Q Zeng, X Du, L Luo arXiv preprint arXiv:1910.07987, 2019 | 32 | 2019 |
PFirewall: Semantics-aware customizable data flow control for smart home privacy protection H Chi, Q Zeng, X Du, L Luo arXiv preprint arXiv:2101.10522, 2021 | 27 | 2021 |
Solminer: mining distinct solutions in programs L Luo, Q Zeng Proceedings of the 38th International Conference on Software Engineering …, 2016 | 24 | 2016 |
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019 | 22 | 2019 |
Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on iot cloud platforms L Luo, Q Zeng, B Yang, F Zuo, J Wang Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 19 | 2021 |
Exploiting the inherent limitation of l0 adversarial examples F Zuo, B Yang, X Li, Q Zeng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 17* | 2019 |
Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019 | 15 | 2019 |
No more companion apps hacking but one dongle: Hub-based blackbox fuzzing of iot firmware X Ma, Q Zeng, H Chi, L Luo Proceedings of the 21st Annual International Conference on Mobile Systems …, 2023 | 12 | 2023 |
G2Auth: secure mutual authentication for drone delivery without special user-side hardware C Wu, X Li, L Luo, Q Zeng Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022 | 12 | 2022 |